Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-26488


In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.


Published

2022-03-10T17:47:45.383

Last Modified

2024-11-21T06:54:02.590

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.0 (HIGH)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.4

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-426

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application python python ≤ 3.7.12 Yes
Application python python ≤ 3.8.12 Yes
Application python python ≤ 3.9.10 Yes
Application python python ≤ 3.10.2 Yes
Application python python 3.11.0 Yes
Application python python 3.11.0 Yes
Application python python 3.11.0 Yes
Application python python 3.11.0 Yes
Application python python 3.11.0 Yes
Application python python 3.11.0 Yes
Operating System microsoft windows - No
Application netapp active_iq_unified_manager - Yes
Application netapp ontap_select_deploy_administration_utility - Yes

References